Professional Documents
Culture Documents
by
ABISNATH
(Register No: 195915101)
(Nationally Re-accredited with „A‟ Grade by NAAC with a CGPA of 3.58 out of 4)
(Recognized by UGC as “College of Excellence”)
Tiruchirappalli – 620 017
NOVEMBER 2019
1
Department of Information Technology
Bishop Heber College (Autonomous)
Tiruchirappalli – 620 017, Tamilnadu, India
Phone No. : 0431 – 277 0136
CERTIFICATE
Examiners:
1.
2.
2
Mrs. K. SIVARANJANI, M.Sc., M. Phil., SET., NET.,
Associate Professor
Department of Information Technology, Bishop
Heber College (Autonomous), Tiruchirappalli –
620 017.
Date:
CERTIFICATE
DECLARATION
3
I hereby declare that the work presented in this project work report is the
original work done by me under the guidance of Mrs. K. SIVARANJANI,
Semester : FIRST
ACKNOWLEDGEMENTS
4
First of all, I would thank THE GOD ALMIGHTY for the abundant grace,
good health and knowledge to do this Project.
S.ABISNATH
5
SYNOPSIS
The Project title is “ MODERN PERIODIC TABLE”, also known as the periodic
table of elements, is a tabular display of the chemical elements, which are arranged by
atomic number, electron configuration, and recurring chemical properties. The
structure of the table shows periodic trends. The seven rows of the table, called
periods, generally have metals on the left and non-metals on the right. The columns,
called groups, contain elements with similar chemical behaviours. Six groups have
accepted names as well as assigned numbers: for example, group 17 elements are the
halogens; and group 18 are the noble gases. Also displayed are four simple rectangular
areas or blocks associated with the filling of different atomic orbitals.
The elements from atomic numbers 1 (hydrogen) through 118 (oganesson) have been
discovered or synthesized, completing seven full rows of the periodic table.[1][2] The
first 94 elements all occur naturally, though some are found only in trace amounts and
a few were discovered in nature only after having first been synthesized.[n 1] Elements
95 to 118 have only been synthesized in laboratories or nuclear reactors.[3] The
synthesis of elements having higher atomic numbers is currently being pursued: these
elements would begin an eighth row, and theoretical work has been done to suggest
possible candidates for this extension. Numerous synthetic radionuclides of naturally
occurring elements have also been produced in laboratories.
6
CONTENT
S. No. PAGE. No.
TITLE
1 INTRODUCTION 1
2 SYSTEM STUDY 2
3 SYSTEM DESIGN 4
4 SYSTEM DEVELOPMENT 9
5 SYSTEM TESTING 27
6 SYSTEM IMPLEMENTATION 31
7 CONCLUSION 36
8 BIBLIOGRAPHY 37
7
1. INTRODUCTION
Dmitri Mendeleev published the first periodic table in 1869. He showed that when the elements
were ordered according to atomic weight, a pattern resulted where similar properties for
elements recurred periodically. Based on the work of physicist Henry Moseley, the periodic table
was reorganized on the basis of increasing atomic number rather than on atomic weight. The
revised table could be used to predict the properties of elements that had yet to be discovered.
Many of these predictions were later substantiated through experimentation. This led to the
formulation of the periodic law, which states that the chemical properties of the elements are
dependent on their atomic numbers.
The periodic table lists elements by atomic number, which is the number of protons in every
atom of that element. Atoms of an atomic number may have varying numbers of neutrons
(isotopes) and electrons (ions), yet remain the same chemical element.
Elements in the periodic table are arranged in periods (rows) and groups (columns). Each of the
seven periods is filled sequentially by atomic number. Groups include elements having the same
electron configuration in their outer shell, which results in group elements sharing similar
chemical properties.
The electrons in the outer shell are termed valence electrons. Valence electrons determine the
properties and chemical reactivity of the element and participate in chemical bonding. The
Roman numerals found above each group specify the usual number of valence electrons.
There are two sets of groups. The group A elements are the representative elements, which
have s or p sublevels as their outer orbitals. The group B elements are the nonrepresentative
elements, which have partly filled d sublevels (the transition elements) or partly filled f
sublevels (the lanthanide series and the actinide series). The Roman numeral and letter
designations give the electron configuration for the valence electrons (e.g., the valence electron
configuration of a group VA element will be s2p3 with 5 valence electrons).
Another way to categorize elements is according to whether they behave as metals or nonmetals.
Most elements are metals. They are found on the left hand side of the table.
8
2. SYSTEM STUDY
System study consists of organizing file and project description. Organization profile
includes the information about a ship details. Project description include existing and proposed
system. Every system is delineated by its spatial and temporal boundaries, surrounded and
influenced by its environment, described by its structure and purpose and expressed in its
functioning. The term system may also refer to criteria that governs structure or behaviour.
Alternatively, and usually in the context of complex social systems, the term is used to describe
the criteria that govern structure or behaviour.
Advantages:
Reduced time consumption
No paper work needed
9
No loss of records
Centralized database management
10
2.1.2. PROPOSED SYSTEM
In the proposed system, the process of payments of goods and maintaining the stock,
database of traders are all made computerized. The manual system has some drawbacks which
can be overcome by using our web based software “Crime Management System”. Citizens need
not go to the police station to file a complaint. Police need not have to maintain records manually
since our software maintains all the records with centralized database. Main objectives are
Reduced time consumption No paper work needed No loss of records Centralized database
management Information about criminals and common people is properly maintained Reduce
error scope. So by this project the process of arriving and leaving, payments and stock
maintenance for a “FIR SHIPPING MANAGEMENT” can be processed easily.
Disadvantages:
Paper work needed
Loss of records
Information about criminals and
common people is not properly maintained
The hardware specification of the Laptop computer system available for developing the
project is given below,
11
2.2.1 Hardware Requirements
RAM : 1GB
Operating System
An operating system is a software that communicate with the hardware and allows other
to run. It comprises the system software, and other utilities. The Operating system used as
platform to develop this project in windows 7 Ultimate and later. It is a multi-user operating
system
Programming Language
The Software application is developed using C. The software name is Dev C++.
12
2.3 SOFTWARE DETAILS
C was originally developed by Dennis Ritchie between 1969 and 1973 at AT & T Bell
Labs, and used to re-implement the UNIX operating system. It has since become one of the most
widely used programming languages of all time, with C compilers from various vendors
available for the majority of existing computer architectures and operating systems. C has been
standardized by the American National Standards Institute (ANSI) since 1989 and subsequently
by the International Organization for Standardization (ISO). C is an imperative (procedural)
language. It was designed to be compiled using a relatively straight forward compiler, to provide
low-level access to memory, to provide language constructs that map efficiently to machine
instructions, and to require minimal run-time support. C was therefore useful for many
applications that had formerly been coded in assembly language, such as in system
programming.
Despite its low-level capabilities, the language was designed to encourage cross-platform
programming. A standards-compliant and portably written C program can be compiled for a very
wide variety of computer platforms and operating systems with few changes to its source code.
The language has become available on a very wide range of platforms, from embedded
microcontrollers to supercomputers.
13
3. SYSTEM DESIGN
START
SELECT AN
OPTION
END
14
Logical design of fir management system
Then Admin checks the records based on their name or fir number.
START
SELECT AN
OPTION
ADD RECORD
END
15
SEARCH RECORD:
START
SELECT AN
OPTION
SEARCH
RECORD
END
The Convict details are entered based on existing and new employees
and their list.
16
LOGICAL DESIGN FOR MODIFY RECORD:
START
SELECT AN
OPTION
MODIFY RECORD
CONVICT’S ENTER ID
NAME
17
LOGICAL DESIGN FOR LIST RECORD:
START
SELECT AN
OPTION
LIST RECORD
END
18
LOGICAL DESIGN FOR DELETE RECORD:
START
SELECT AN
OPTION
DELETE RECORD
PASSWORD
CONVICT NAME
END
19
3.3 OUPUT DESIGN:
ADMIN LOGIN
FIR RECORDS
20
3.4 MODULE DESCRIPTION
A module is a software component or part of a program that contains one or more routines. One
or more independently developed modules make up a program. An enterprise-level software
application may contain several different modules, and each module serves unique and separate
business operations. Modules make a programmer’s job easy by allowing the programmer to
focus on only one area of the functionality of the software application. Modules are typically
incorporated into the program (software) through interfaces.
MODULES
In module description it contains the following modules
Add Records
Search Record
Modify Record
List Record
Delete Record
Add Record
In Add Record all the information about the convict details like their convict no, convict
name, address and contact emergency number details are stored in the file.
Search Record
A new record or existing record can be search through this module to find the convict’s
details quickly using convict name and their ID.
Modify Record
A Stock is a business statement that provides information on the values and quantity of
stock related transaction.
21
List Record
A list of whole fir record can be listed and displayed through this module to list the
convict’s details.
Delete Record
If the conviction were finished, the added record of that convict’s details can be deleted
through this module using the admin password..
22
4. SYSTEM DEVELOPMENT
The Software Development Life Cycle (SDLC), also referred to as the application
development life-cycle, is a term used in systems engineering, information systems and software
engineering to describe a process for planning, creating, testing, and deploying an information
system. The systems development life-cycle concept applies to a range of hardware and software
configurations, as a system can be composed of hardware only, software only, or a combination
of both.
SOURCE CODE
#include<stdio.h>
#include<stdlib.h>
#include<conio.h>
#include<string.h>
void addrecord();
void viewrecord();
void editrecord();
void searchrecord();
void deleterecord();
void login();
struct record
char id[10];
char name[30];
char age[6];
char gender[10];
23
char weight[20];
char height[20];
char haircolor[20];
char eyecolor[20];
char crime[40];
char details[20];
char court[20];
char act[20];
char punishment[50];
char faddress[20];
char fir[20];
char emergencyc[20];
char emergencyr[20];
char datearr[20];
} a;
int main()
login();
int ch;
printf("\n\n\t====================================\n");
printf("\t====================================");
while(1)
printf("\n\n\t\t::MAIN MENU::");
printf("\n\t\tSEARCH RECORD\t[ENTER-2]");
printf("\n\t\tMODIFY RECORD\t[ENTER-3]");
24
printf("\n\t\tLIST RECORD\t[ENTER-4]");
printf("\n\t\tDELETE RECORD\t[ENTER-5]");
printf("\n\t\tEXIT\t\t[ENTER-6]");
scanf("%d",&ch);
switch(ch)
case 1:
addrecord();
break;
case 2:
searchrecord();
break;
case 3:
editrecord();
break;
case 4:
viewrecord();
break;
case 5:
deleterecord();
break;
case 6:
system("cls");
getch();
exit(0);
25
default:
getch();
break;
system("cls");
return 0;
void addrecord( )
system("cls");
FILE *fp ;
char filename[30];
int choice;
printf("\n\n\t\t====================================\n");
printf("\n\t\t====================================\n");
printf("\n\n\tENTER FIRST NAME OF CONVICT(To Check whether record exists or not): ");
fflush(stdin);
gets(filename);
if ( fp == NULL )
fp=fopen("filename","wb+");
if(fp==NULL)
26
{
printf("\nSYSTEM ERROR...");
getch();
return ;
choice=0;
fflush(stdin);
scanf("%s",id);
rewind(fp);
while(fread(&a,sizeof(a),1,fp)==1)
if(strcmp(a.id,id)==0)
choice=1;
if(choice==0)
strcpy(a.id,id);
fflush(stdin);
27
gets(a.name);
gets(a.gender);
fflush(stdin);
gets(a.age);
fflush(stdin);
gets(a.weight);
fflush(stdin);
gets(a.height);
fflush(stdin);
gets(a.haircolor);
fflush(stdin);
gets(a.eyecolor);
fflush(stdin);
gets(a.details);
fflush(stdin);
gets(a.crime);
fflush(stdin);
gets(a.court);
fflush(stdin);
28
printf("\tACT(under which convicted): ");
gets(a.act);
fflush(stdin);
gets(a.punishment);
fflush(stdin);
gets(a.faddress);
fflush(stdin);
gets(a.fir);
fflush(stdin);
gets(a.emergencyc);
fflush(stdin);
gets(a.emergencyr);
fflush(stdin);
gets(a.datearr);
fflush ( stdin ) ;
another = getch( ) ;
fclose ( fp ) ;
29
getch();
void searchrecord( )
system("cls");
FILE *fp ;
char id[16],choice,filename[14];
int ch;
printf("\n\n\t\t====================================\n");
printf("\n\t\t====================================\n\n");
do
fflush(stdin);
gets(filename);
//system("cls");
gets(id);
system("cls");
//{
if(strcmpi(a.id,id)==0)
{ printf("\n");
30
printf("\nCONVICT'S GENDER IS: %s",a.gender);
printf("\n");
// }
fflush(stdin);
scanf("%c",&choice);
while(choice=='Y'||choice=='y');
fclose ( fp) ;
getch();
return ;
getch();
31
}
void editrecord()
system("cls");
FILE *fp ;
char id[10],choice,filename[14];
int num,count=0;
printf("\n\n\t\t====================================\n");
printf("\n\t\t====================================\n\n");
do
fflush(stdin);
gets(filename);
printf("\n\tENTER ID:");
gets(id);
/*if ( fp == NULL )
getch();
return;
}*/
if(strcmp(a.id,id)==0)
32
{
printf("\nCOURT: %s",a.court);
printf("\n1.NAME.");
printf("\n2.SEX.");
printf("\n3.AGE.");
printf("\n4.WEIGHT.");
printf("\n5.HEIGHT.");
printf("\n6.HAIRCOLOR.");
printf("\n7.EYECOLOR.");
printf("\n8.CRIME.");
printf("\n9.FACE DETAILS.");
33
printf("\n10.COURT.");
printf("\n11.ACT.");
printf("\n12.CONVICTION.");
printf("\n14.FIR NUMBER.");
printf("\n15.EMERGENCY CONTACT.");
printf("\n17.ARRESTED DATE.");
printf("\n18.WHOLE RECORD.");
do
fflush(stdin);
scanf("%d",&num);
fflush(stdin);
switch(num)
case 1:
printf("\nNAME:");
gets(a.name);
break;
case 2:
printf("\nSEX:");
gets(a.gender);
break;
case 3:
34
printf("\nENTER THE NEW DATA:");
printf("\nAGE:");
gets(a.age);
break;
case 4:
printf("\nWEIGHT:");
gets(a.weight);
break;
case 5:
printf("\nHEIGHT:");
gets(a.height);
break;
case 6:
printf("\nHAIRCOLOR:");
gets(a.haircolor);
break;
case 7:
printf("\nEYECOLOR:");
gets(a.eyecolor);
break;
case 8:
printf("\nCRIME:");
gets(a.crime);
break;
35
case 9:
printf("\nFACE DETAILS:");
gets(a.details);
break;
case 10:
printf("\nCOURT:");
gets(a.court);
break;
case 11:
printf("\nACT:");
gets(a.act);
break;
case 12:
printf("\nCONVICTION:");
gets(a.punishment);
break;
case 13:
gets(a.faddress);
break;
case 14:
printf("\nFIR NUMBER:");
gets(a.fir);
36
break;
case 15:
printf("\nEMERGENCY CONTACT:");
gets(a.emergencyc);
break;
case 16:
gets(a.emergencyr);
break;
case 17:
printf("\nARRESTED DATE:");
gets(a.emergencyc);
break;
case 18:
printf("\tCONVICT'S NAME:");
gets(a.name);
printf("\tSEX:");
gets(a.gender);
printf("\tAGE:");
gets(a.age);
printf("\tWEIGHT:");
gets(a.weight);
printf("\tHEIGHT:");
gets(a.height);
printf("\tHAIRCOLOR:");
37
gets(a.haircolor);
printf("\tEYECOLOR:");
gets(a.eyecolor);
printf("\tCRIME:");
gets(a.age);
printf("\tFACE DETAILS:");
gets(a.details);
printf("\tCOURT:");
gets(a.court);
printf("\tACT:");
gets(a.act);
printf("\tCONVICTION:");
gets(a.punishment);
gets(a.faddress);
printf("\tFIR NUMBER:");
gets(a.fir);
printf("\tEMERGENCY CONTACT:");
gets(a.emergencyc);
gets(a.emergencyr);
printf("\tARRESTED DATE:");
gets(a.datearr);
break;
case 19:
getch();
return ;
break;
38
default:
break;
while(num<1||num>20);
fseek(fp,-sizeof(a),SEEK_CUR);
fwrite(&a,sizeof(a),1,fp);
fseek(fp,-sizeof(a),SEEK_CUR);
fread(&a,sizeof(a),1,fp);
choice=5;
break;
if(choice==5)
system("cls");
printf("\n\t\tEDITING COMPLETED...\n");
printf("--------------------\n");
printf("--------------------\n");
39
printf("\nFACE DETAILS: %s",a.details);
printf("\nACT: %s",a.act);
fclose(fp);
scanf("%c",&choice);
count++;
else
scanf("%c",&choice);
while(choice=='Y'||choice=='y');
fclose ( fp ) ;
getch();
40
}
void viewrecord()
system("cls");
FILE *fp;
//struct record a;
char filename[30];
printf("\n\n\t\t====================================\n");
printf("\n\t\t====================================\n");
fp=fopen("filename","rb");
rewind(fp);
while((fread(&a,sizeof(a),1,fp))==1)
printf("\nACT: %s",a.act);
41
printf("\nFIR NUMBER: %s",a.fir);
getch();
fclose(fp);
getch();
void deleterecord( )
system("cls");
FILE *fp,*ft ;
int choice,check;
int j=0;
char pass[8];
printf("\n\n\t\t====================================\n");
printf("\n\t\t====================================\n\n");
printf("\nENTER PASSWORD\n");
int i;
42
for( i=0;i<4;i++)
pass[i]=getch();
printf("*");
if (strcmpi(pass,"pass")==0)
printf("\n\t\t*ACCESS GRANTED*\n\n");
fflush(stdin);
gets(filename);
if ( fp == NULL )
getch();
return ;
ft=fopen("temp","wb");
if(ft==NULL)
printf("\nSYSTEM ERROR");
getch();
43
return ;
fflush(stdin);
gets(id);
while(fread(&file,sizeof(file),1,fp)==1)
if(strcmp(file.id,id)!=0)
fwrite(&file,sizeof(file),1,ft);
fclose(ft);
fclose(fp);
remove("filename");
rename("temp","filename");
printf("\nDELETED SUCCESFULLY...");
getch();
fflush(stdin);
scanf("%c",&another);
getch();
else
printf("\nSorry!Invalid password\n");
exit(0);
44
}
void login()
int a=0,i=0;
char pword[10],code[10];
char user[10]="user";
char pass[10]="pass";
do
scanf("%s", &uname);
while(i<10)
pword[i]=getch();
c=pword[i];
if(c==13) break;
else printf("*");
i++;
pword[i]='\0';
//char code=pword;
i=0;
//scanf("%s",&pword);
45
printf(" \n\n\n WELCOME TO POLICE FIR RECORD MANAGEMENT SYSTEM !! YOUR LOGIN IS
SUCCESSFUL");
break;
else
a++;
system("cls");
while(a<=2);
if (a>2)
printf("\nSorry you have entered the wrong username and password for four times!!!");
getch();
system("cls");
46
5. SYSTEM TESTING
System testing is the process of evaluation a software item to detect differences between
given input and expected output. Also, to assess the loan processing. Testing assesses the quality
of the product. Software testing is a process that should be done during the development process.
In other words, software testing is a verification and validation process.
‘Unit testing begins at the vertex of the spiral and concentrates on each unit of the software as
implemented in source code. Initially test focus on each module individually, assuring that it
functions properly as a unit. Hence the name is unit testing. Unit testing makes heavy use of
white box testing techniques, exercising specific paths in a module’s control structure to ensure
complete coverage and maximum error detection. Unit testing focuses verification effort on the
smallest unit of software design the module.
Main Menu:
47
5.2 INTEGRATION TESTING
Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. The combination of components is correct and consistent.
Integration testing is specifically aimed at exposing the problems that arise from the combination
of components. In this testing the each and every module are linked together by using the data to
be transfer from one module field to another.
Validation testing is the process of ensuring if the tested and developed software satisfies
the client /user needs. The business requirement logic or scenarios have to be tested in detail. All
the critical functionalities of an application must be tested here.
48
6. SYSTEM IMPLEMENTATION
Implementation is the final step of the project when the theoretical design is turned out
into a working system. Thus, it can be consider being the most critical stage in achieving a
successful new system and in giving the user, confidence that the new system will work and be
effective. The main objective of this user manual is to introduce the user with the available
facilities in the Download Manager. It provides a conceptual overview of the functioning of the
system and the detailed discussion and reports. This user manual is divided into following
logical parts:
1. Getting Started.
2. Functioning of the system.
The information regarding how one can start with the Download Manager and how to
select appropriate menus available on the main screen can be seen and Find in the Getting
Started portion.
The Functioning of the system part deals with the description of the purpose of each of
the menu items and screens. It also describes the functioning of the system i.e. where to input
data, how to process it and the detailed information about the reports and their printing. This
portion also describes the purpose of each input screen used in the system. The error messages
and their explanations and appropriate actions to be taken is handled by Trouble Shooting part
of the user manual of this document.
Getting Started:
To start the Download Manager, the steps to be followed are:
1. Switch ON the terminal / computer.
2. Windows is loaded and among various icons on the desktop, double clicks the Download
Manager Icon.
49
Screenshots :
Admin page:
Main Page:
51
Modify Fir Record:
52
List Fir Record:
54
8. BIBOLOGRAPHY
Reference books:
Reference websites:
1. http://www.cprogramming.com/
2. http://www.linuxtopia.org/online_books/
3. http://www.mycplus.com/
4. http://einstein.drexel.edu/courses/Comp_Phys/General/C_basics
5. http://www2.its.strath.ac.uk/courses/c/
6. http://stackoverflow.com/
55
56
57